Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

Buy

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.”

—Charles C. Palmer, IBM Research 

The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures

 

Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security—so you can prevent serious problems and mitigate the effects of those that still occur.

 

In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger—authors of the classic Security in Computing—teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations.

 

The book covers “hot button” issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure.

 

Coverage includes 

  • Understanding threats, vulnerabilities, and countermeasures
  • Knowing when security is useful, and when it’s useless “security theater”
  • Implementing effective identification and authentication systems
  • Using modern cryptography and overcoming weaknesses in cryptographic systems
  • Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more
  • Understanding, preventing, and mitigating DOS and DDOS attacks
  • Architecting more secure wired and wireless networks
  • Building more secure application software and operating systems through more solid designs and layered protection
  • Protecting identities and enforcing privacy
  • Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media

 

(HTML tags aren't allowed.)

Microsoft Press Computer Dictionary, 4th Edition
Microsoft Press Computer Dictionary, 4th Edition
A comprehensive dictionary for people who work with microcomputers but aren't computer professionals. Some 5,000 entries define both basic and more advanced terms, and include phonetic pronunciations where appropriate. Some definitions are accompanied by drawings, diagrams, or other graphics. Annotation copyright Book News, Inc. Portland, Or....
Bomb the Suburbs: Graffiti, Race, Freight-Hopping and the Search for Hip-Hop's Moral Center
Bomb the Suburbs: Graffiti, Race, Freight-Hopping and the Search for Hip-Hop's Moral Center
Should graffiti writers organize to tear up the cities, or should they really be bombing the ‘burbs? That’s the question posed by William Upski Wimsatt in his seminal foray into the world of hip-hop, rap, and street art, and the culture and politics that surround it. But to say that the book deals only with taggers and hip-hop is...
.NET Test Automation Recipes: A Problem-Solution Approach (Expert's Voice in .NET)
.NET Test Automation Recipes: A Problem-Solution Approach (Expert's Voice in .NET)
This book presents practical techniques for writing lightweight software test automation in a .NET environment. If you develop, test, or manage .NET software, you should find this book useful. Before .NET, writing test automation was often as difficult as writing the code for the application under test itself. With .NET, you can...

Write Great Code: Understanding the Machine
Write Great Code: Understanding the Machine

This, the first volume in Randall Hyde’s Write Great Code series, dives into machine organization without the extra overhead of learning assembly language programming. Written for C/C++, VB, Pascal, Java, and other high-level language programmers, Volume I, “Understanding the Machine,” fills in the low-level details...

Forensic CBT: A Handbook for Clinical Practice
Forensic CBT: A Handbook for Clinical Practice

Forensic CBT: A Handbook for Clinical Practice is an edited collection that represents the first authoritative resource on the utilization of CBT strategies and techniques for offender clients.

  • Features contributions from leaders of the major schools of CBT on the treatment of antisocial personality patterns as well...
Beginning Apache Cassandra Development
Beginning Apache Cassandra Development

Beginning Apache Cassandra Development introduces you to one of the most robust and best-performing NoSQL database platforms on the planet. Apache Cassandra is a document database following the JSON document model. It is specifically designed to manage large amounts of data across many commodity servers without there being any single...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy